Nigeria’s small businesses needs government help, but corruption is voiding it away

Forget Rodeo Drive, Fifth Avenue, or Regent Street—Balogun Market in Lagos truly is the shopping metropolis of the world. Its crammed, umbrella-shielded corrugated metal stalls is abuzz with trades and transactions. Hundreds more shops, wholesalers, and cramped workshops fill the honeycombed concrete buildings that ring the market.

People crowd on a road near Balogun market, Lagos

Balogun Market is in many ways a little world of Nigeria: a country known globally as a petro-economy, but one that in reality is a country of small business people. Nigeria’s entrepreneurs generally power Africa’s largest economy, generating almost 50% of its GDP and employing 60 million people—roughly 84% of its labor force.

Read here more:

Knoxville entrepreneur release a simple way to keep your hotel key safer

Erica Grant bears the key to rectifying a security flaw that puts thousands of hotels – and their guests – at risk each year.

With as much enthusiasm for security as she has for quantum computing, Grant, 24, has unlocked a way to guard doors against tech-savvy intruders.

Erica Grant, CEO of Quantum Lock, is developing a smart lock that uses quantum physics. She is pictured with a prototype of her device. (Photo: Saul Young/News Sentinel)

Her perception sets out to fix one big problem: It’s viable– easy, even – to get an old key card from a hotel and convert it into a master key that can access any room in the building, said Grant, a Virginia native now pursuing her doctorate through the Bredesen Center for Interdisciplinary Research and Graduate Education at the University of Tennessee.

Read here:

Komodo Incorporates Dilithium: A Quantum-Secure Digital Signature Scheme

Komodo is delighted to declare the incorporation of Dilithium, a quantum-secure digital signature scheme. This new technology yield protection against attacks from quantum computers, ensuring an unparalleled level of security.

Image Credit: Komodo

While adopting a quantum-secure cryptographic signature scheme would normally be the only focus of an entire blockchain project— perhaps with its own coin, an ICO, and a dedicated team of developers— the power of Komodo’s technology allowed jl777 to complete the task in just a few days.

Read more here:

Extremely precise measurements of atom positioning for quantum computing

A new technique allows the quantum state of atomic “qubits”— the basic unit of data in quantum computers — to be measured with twenty times less error than was previously feasible, without losing any atoms. Precisely measuring qubit states, which are equivalent to the one or zero states of bits in traditional computing, is a vital step in the development of quantum computers.

A new method allows extremely accurate measurement of the quantum state of atomic qubits — the basic unit of information in quantum computers. Atoms are initially sorted to fill two 5×5 planes (dashed yellow grid marks their initial locations). After the first images are taken, microwaves are used to put the atoms into equal superpositions of two spin states. A shift to the left or right in the final images corresponds to detection in one spin state or the other. Associated square patterns denote atom locations (cyan: initial position, orange and blue: shifted positions). Credit: Weiss Laboratory, Penn State

We are working to develop a quantum computer that uses a three-dimensional array of laser-cooled and trapped cesium atoms as qubits,” said David Weiss, professor of physics at Penn State and the leader of the research team.

Read more at:

There’s a new way to disrupt quantum cryptography

The great promise of quantum dissemination is perfect privacy: the ability to convey a message from one point in the universe to another in such a way that the very laws of physics prevent an wiretapper from listening in.

470906 | UNSPLASH

For hackers, that kind of promise is like a red flag to a bull. Since the first commercial quantum cryptography systems became available in the early 2000s, people have often attempted to bring them down—with significant success. The attacks have ruthlessly utilize imperfections in the equipment used to send quantum information.

Read more here:

An Idealist’s View of the 4 Challenges to Quantum Computing

Quantum computers promise an aggressive increase in power compared with today’s classical CMOS-based systems. This growth is of a magnitude that is difficult for the human mind to grasp. So there is real excitement that quantum computers will bring benefits that are not possible with today’s systems.

Intel’s 17-superconducting-qubit test chip has already been superseded by a 49-qubit device.
Image Credit: Intel

With such assurance, we are seeing the rise of quantum computing prophets who say that, in just a few years, these machines will have the power to change the world. And conversely, we’re seeing more quantum computing skeptics who say it will never happen.

Read more here:

Quantum computer program developed to identify leakage of concealed information to unwanted states

Researchers from the University of Warwick claim to have formed a new quantum computer program that can identify leakage of information from the states of 0 and 1 to unwanted states.

The concept of quantum computers was first theorised in 1980s. Image via Pixabay.

According to the researchers, the new technology will give users the capacity to check the reliability of quantum processing and to establish that quantum computing machines are doing precisely what they are supposed to do.

Read more here:

NIST drives new encryption protocols for quantum, connected devices

In a March 20 rundown to the Information Security and Privacy Advisory Board, Matthew Scholl, Chief of the Computer Security Division at NIST, said the agency spent much of the past year assessing 69 algorithms for its Post Quantum Cryptography Standardization project, a 2016 project designed to guard the machines used by federal agencies today from the encryption-breaking tools of tomorrow.

Image Credit: The Business of Federal Technology

The presented algorithms are all designed to work with current technology and equipment, each contribution in different ways to protect computers and data from attack vectors – known and unknown – posed by developments in quantum computing.

Read more here:

D-Wave 2000Q hands-on: Sheer learning curve for quantum computing

“You know Python?”

Questions from John Timmer, the Ars Technica Ruler of All Things Science, are sometimes unforeseen. If Slack could infuse letters with caution, a “Yes” would have dripped with it.

Enlarge / Algorithms, a complicated work in progress. Image Credit: Getty Images

It turns out that D-Wave was loosing its quantum optimizer (the company had just announced a new version) on the world via an application programming interface (API). Ars was being invited to try it out, but one needed to know some Python.

Read more here:

Inside the Risky Race to Make Quantum Computers Work

Underneath the Franco-Swiss border, the Large Hadron Collider is sleeping. But it won’t be quiet for long.

Over the years to come, the world’s largest particle accelerator will be supercharged, increasing the number of proton collisions per second by a factor of two and a half.

Image Credit: Getty Images

Once the work is complete in 2026, researchers hope to unlock some of the most underlying questions in the universe. But with the increased power will come a flash flood of data the likes of which high-energy physics has never seen before. And, right now, humanity has no way of knowing what the collider might find.

Read more here: